Webinar: Off-Channel Communications: Strategies and Best Practices Never have there been so many communication devices, apps, and services available for use by employees, and employees helping themselves to these options can create
Webinar: No Maps for These Territories: The Uncertain Legal Future of Crypto
Webinar: No Maps for These Territories: The Uncertain Legal Future of Crypto The past year has been one of dramatic upheavals in countless areas, perhaps none more so than cryptocurrency and decentralized
Teach an Attorney to Phish: Lawyers’ Duties in a Digital World
Teach an Attorney to Phish: Lawyers' Duties in a Digital World The cyber landscape has never felt more like a wild frontier. Phishing attacks continue to rise, as do ransomware attacks and
Six Data Protection Strategies for Legal Teams: Mitigating Risk, Maintaining Reputation
No organization is immune from cyber incidents. Although helpful, minimalist data protection practices are often not enough to save organizations from costly data loss and embarrassing reputational damage. This Practice Guide reviews six strategies for mitigating the risk of cyber incidents in your organization.
Webinar: Staying Safe in the Wildlands
Webinar: Staying Safe in the Wildlands The cyber landscape has never felt more like a wild frontier. Phishing attacks of all kinds continue to rise, as do ransomware attacks and other breaches, all
ED103 – The Grand Scavenger Hunt: Collection Fundamentals
Since electronically-stored information (ESI) has become the norm in discovery, competence with technology has become an essential part of being an effective legal practitioner, and understanding the technology fundamentals of collection has become essential to fulfilling a lawyer’s duty of technology competence.
ED101 – The Evolving Duty of Technology Competence
In discovery specifically, and in legal practice generally, the role of electronically-stored information (ESI) and new technology has grown exponentially over the past decade, as new sources have proliferated, new tools have become normalized, and new communication channels have supplanted the old.
Cyber Incident Response
Cyber Incident Response Control risks by promptly identifying and notifying individuals affected by a cyber incident Streamline incident investigation and notification processes with trusted expertise Solutions delivered for a fixed cost

How to Maintain Effective and Secure Long-Term Vendor Relationships: Understanding the Risks (Part Two of Two)
How to Maintain Effective and Secure Long-Term Vendor Relationships: Understanding the Risks (Part Two of Two) For a vendor relationship to be long-lasting and effective, both sides should be able to identify when

How to Maintain Effective and Secure Long-Term Vendor Relationships: Understanding the Risks (Part One of Two)
How to Maintain Effective and Secure Long-Term Vendor Relationships: Understanding the Risks (Part One of Two) Once the critical process of vetting and selecting vendors is complete, the third-party oversight work begins. Change
The Journey of Law Firm Security Assessments, From Genesis to Review
The Journey of Law Firm Security Assessments, From Genesis to Review Legal ops professionals from Disney and Walgreens captured the changing law firm cybersecurity paradigm and some of the bumps they encountered in
New EU Regulation Makes Data Exchange with Countries More Difficult – Threat of More Legal Disputes
Börsen-Zeitung (June 8, 2018): Data Transfer Trouble (Translation from the German original „Daumenschrauben beim Datentransfer“) New EU regulation makes data exchange with countries more difficult – Threat of more legal disputes Author: Heidi Rohde.
Interview: Ben Rusch of Consilio on the practical problems of collecting data in the EU
Interview: Ben Rusch of Consilio on the practical problems of collecting data in the EU Ben Rusch, interviewed by Chris Dale for the eDisclosure Information Project, is
Webinar: Cybersecurity Impacts on the Legal Industry with Conoco Phillips & Consilio
Webinar: Cybersecurity Impacts on the Legal Industry
Whitepaper: Rise of Law Firm Hacks Leads to More Scrutiny From Corporate Clients
Whitepaper: Rise of Law Firm Hacks Leads to More Scrutiny From Corporate Clients Third-Party Cybersecurity Assessments Help Manage Risk Karen Hornbeck, Consilio Last year was a lightning rod for law firm
Eye on Discovery – Four Technologies Help Limit and Manage PII in Cross-Border eDiscovery
Four Technologies Help Limit and Manage PII in Cross-Border eDiscovery With the General Data Protection Regulation (GDPR) yet to go into effect and evolving data privacy laws, organizations face a huge challenge when it
Are You Ready for the New China Cybersecurity Law?
Are You Ready for the New China Cybersecurity Law? Managing Director, Dan Whitaker discusses China's comprehensive Cybersecurity Law and the implications it will have on businesses when it goes into effect in June
Eye on Discovery – Can You Trust Your Law Firms With Your Data?
Eye on Discovery -Can You Trust Your Law Firms With Your Data? Your data is only as safe as the data of your least secure link to it. Unfortunately, for many organizations, suppliers that
Eye on Discovery – 11.5 Million Reasons for Law Firms to Take Data Security Seriously
Eye on Discovery - 11.5 Million Reasons for Law Firms to Take Data Security Seriously In early April, we bore witness to what may be the largest data breach in history: 11.5 million confidential
How Businesses Can Protect Themselves from IP Theft by John Shaw
How Businesses Can Protect Themselves from IP Theft by John Shaw February 2012 Software companies can spend enormous amounts of money and time developing new products; yet underestimate the ease of code being